Sec+ Objective 5 Test Questions Flashcards
A company is formalizing the design and deployment process used by their application programmers. Which of the following policies would apply?
❍ A. Business continuity
❍ B. Acceptable use policy
❍ C. Incident response
❍ D. Development lifecycle
D. Development lifecycle
A formal software development lifecycle defines the specific policies associated with the design, development, testing, deployment, and maintenance of the application development process. (5.1)
A company hires a large number of seasonal employees, and their system access should normally be disabled when the employee leaves the company. The security administrator would like to verify that their systems cannot be accessed by any of the former employees. Which of the following would be the BEST way to provide this verification?
❍ A. Confirm that no unauthorized accounts have administrator access
❍ B. Validate the account lockout policy
❍ C. Validate the offboarding processes and procedures
❍ D. Create a report that shows all authentications for a 24-hour period
C. Validate the offboarding processes and procedures
The disabling of an employee account is commonly part of the offboarding process. One way to validate an offboarding policy is to perform an audit of all accounts and compare active accounts with active employees. (5.1)
An organization maintains a large database of customer information for sales tracking and customer support. Which person in the organization would be responsible for managing the access rights to this data?
❍ A. Data processor
❍ B. Data owner
❍ C. Data subject
❍ D. Data custodian
D. Data custodian
The data custodian manages access rights and sets security controls to the data. (5.1)
The Vice President of Sales has asked the IT team to create daily backups of the sales data. The Vice President is an example of a:
❍ A. Data owner
❍ B. Data controller
❍ C. Data steward
❍ D. Data processor
A. Data owner
The data owner is accountable for specific data, so this person is often a senior officer of the organization. (5.1)
A company’s human resources team maintains a list of all employees participating in the corporate savings plan. A third-party financial company uses this information to manage stock investments for the employees. Which of the following would describe this financial company?
❍ A. Processor
❍ B. Owner
❍ C. Controller
❍ D. Custodian
A. Processor
A data processor performs some type of action to the data, and this is often a different group within the organization or a third-party company. In this example, the third-party financial organization is the data processor of the employee’s financial data. (5.1)
The contract of a long-term temporary employee is ending. Which of these would be the MOST important part of the off-boarding process?
❍ A. Perform an on-demand audit of the user’s privileges
❍ B. Archive the decryption keys associated with the user account
❍ C. Document the user’s outstanding tasks
❍ D. Obtain a signed copy of the Acceptable Use Policies
B. Archive the decryption keys associated with the user account
Without the decryption keys, it will be impossible to access any of the user’s protected files once they leave the company. Given the other possible answers, this one is the only one that would result in unrecoverable data loss if not properly followed. (5.1)
A company is implementing a series of steps to follow when responding to a security event. Which of the following would provide this set of processes and procedures?
❍ A. MDM
❍ B. DLP
❍ C. Playbook
❍ D. Zero trust
C. Playbook
A playbook provides a conditional set of steps to follow when addressing a specific event. An organization might have separate playbooks for investigating a data breach, responding to a virus infection, or recovering from a ransomware attack. (5.1)
During the onboarding process, the IT department requires a list of software applications associated with the new employee’s job functions. Which of the following would describe the use of this information?
❍ A. Access control configuration
❍ B. Encryption settings
❍ C. Physical security requirements
❍ D. Change management
A. Access control configuration
The onboarding team needs to assign the proper access controls to new employees, and the list of applications provides additional details regarding application and data access. (5.1)
A system administrator is working on a contract that will specify a minimum required uptime for a set of Internet-facing firewalls. The administrator needs to know how often the firewall hardware is expected to fail between repairs. Which of the following would BEST describe this information?
❍ A. MTBF
❍ B. RTO
❍ C. MTTR
❍ D. RPO
A. MTBF
The MTBF (Mean Time Between Failures) is a prediction of how often a repairable system will fail. (5.2)
Which of the following is used to describe how cautious an organization might be to taking a specific risk?
❍ A. Risk appetite
❍ B. Risk register
❍ C. Risk transfer
❍ D. Risk reporting
A. Risk appetite
A risk appetite is a broad description of how much risk-taking is deemed acceptable. An organization’s risk appetite posture might be conservative, or they might be more expansionary and willing to take additional risks. (5.2)
Which of the following describes a monetary loss if one event occurs?
❍ A. ALE
❍ B. SLE
❍ C. RTO
❍ D. ARO
B. SLE
SLE (Single Loss Expectancy) describes the financial impact of a single event. (5.2)
What is SLE?
Single Loss Expectancy. The monetary loss received if one single event occurs. AV x EF = SLE
A transportation company is installing new wireless access points in their corporate office. The manufacturer estimates the access points will operate an average of 100,000 hours before a hardware-related outage. Which of the following describes this estimate?
❍ A. MTTR
❍ B. RPO
❍ C. RTO
❍ D. MTBF
D. MTBF
The MTBF (Mean Time Between Failures) is the average time expected between outages. This is usually an estimation based on the internal device components and their expected operational lifetime. (5.2)
An organization has previously purchased insurance to cover a ransomware attack, but the costs of maintaining the policy have increased above the acceptable budget. The company has now decided to cancel the insurance policies and address potential ransomware issues internally. Which of the following would best describe this action?
❍ A. Mitigation
❍ B. Acceptance
❍ C. Transference
❍ D. Risk-avoidance
B. Acceptance
Risk acceptance is a business decision that places the responsibility of the risky activity on the organization itself. (5.2)
Which of the following would be the best way to describe the estimated number of laptops that might be stolen in a fiscal year?
❍ A. ALE
❍ B. SLE
❍ C. ARO
❍ D. MTTR
C. ARO
The ARO (Annualized Rate of Occurrence) describes the number of instances estimated to occur in a year. For example, if the organization expect to lose seven laptops to theft in a year, the ARO for laptop theft is seven. (5.2)
What is ARO?
Annualized Rate of Occurrence. How often a risk will occur in a single year.
The IT department of a transportation company maintains an on-site inventory of chassis-based network switch interface cards. If a failure occurs, the on-site technician can replace the interface card and have the system running again in sixty minutes. Which of the following BEST describes this recovery metric?
❍ A. MTBF
❍ B. MTTR
❍ C. RPO
❍ D. RTO
B. MTTR
MTTR (Mean Time To Restore) is the amount of time required to get back up and running. This is sometimes called Mean Time To Repair. (5.2)
Each year, a certain number of laptops are lost or stolen and must be replaced by the company. Which of the following would describe the total cost the company spends each year on laptop replacements?
❍ A. SLE
❍ B. SLA
❍ C. ALE
❍ D. ARO
C. ALE
The ALE (Annual Loss Expectancy) is the total amount of the financial loss over an entire year. (5.2)